A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities

A Alshamrani, S Myneni, A Chowdhary… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Threats that have been primarily targeting nation states and their associated entities have
expanded the target zone to include the private and corporate sectors. This class of threats …

SoK: cryptojacking malware

E Tekiner, A Acar, AS Uluagac, E Kirda… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
Emerging blockchain and cryptocurrency-based technologies are redefining the way we
conduct business in cyberspace. Today, a myriad of blockchain and cryp-tocurrency …

A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Automated machine learning for deep learning based malware detection

A Brown, M Gupta, M Abdelsalam - Computers & Security, 2024 - Elsevier
Deep learning (DL) has proven to be effective in detecting sophisticated malware that is
constantly evolving. Even though deep learning has alleviated the feature engineering …

[PDF][PDF] A brief study of wannacry threat: Ransomware attack 2017

S Mohurle, M Patil - International journal of advanced research in …, 2017 - sbgsmedia.in
Recently Ransomware virus software spread like a cyclone winds. A cyclone wind creates
atmospheric instability; likewise ransomware creates computer data instability. Every user is …

Machine learning aided Android malware classification

N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …

Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers

W Wang, Y Li, X Wang, J Liu, X Zhang - Future generation computer …, 2018 - Elsevier
Android platform has dominated the markets of smart mobile devices in recent years. The
number of Android applications (apps) has seen a massive surge. Unsurprisingly, Android …

Container security: precaution levels, mitigation strategies, and research perspectives

DP VS, SC Sethuraman, MK Khan - Computers & Security, 2023 - Elsevier
The enterprise technique for application deployment has undergone a major transformation
during the past two decades. Using conventional techniques, software developers write …

Deep neural network based anomaly detection in Internet of Things network traffic tracking for the applications of future smart cities

DKK Reddy, HS Behera, J Nayak… - Transactions on …, 2021 - Wiley Online Library
An anomaly exposure system's foremost objective is to categorize the behavior of the system
into normal and untruthful actions. To estimate the possible incidents, the administrators of …

A novel graph-based approach for IoT botnet detection

HT Nguyen, QD Ngo, VH Le - International Journal of Information Security, 2020 - Springer
Abstract The Internet of things (IoT) is the extension of Internet connectivity into physical
devices and everyday objects. These IoT devices can communicate with others over the …